phplugins / Leaked_Malware_SourceCodeLinks
☆18Updated 9 years ago
Alternatives and similar repositories for Leaked_Malware_SourceCode
Users that are interested in Leaked_Malware_SourceCode are comparing it to the libraries listed below
Sorting:
- ☆26Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 13 years ago
- ☆19Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Shellcode tracer☆15Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Ring3 Rootkit Backdoor.☆42Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Updated 7 years ago
- Various Crypter Project☆52Updated 11 years ago
- ☆43Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- ☆44Updated 8 years ago
- metasploit loader with antivirus bypass module☆17Updated 9 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Updated 13 years ago
- C code metamorphic obfuscator☆14Updated 10 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 12 years ago
- Anti-AV compilation☆44Updated 11 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago